Title: The Egg Hunter
Video: The Egg Hunter
After taking the Metasploit Unleashed course I came across Skape's paper in the exploit section: Safely Searching Process Virtual Address Space
This is a detailed look out how the Egg Hunter works and how it can be implemented with an exploit. Make sure to select the full screen toggle and thanks for watching. Also you might want to lower your volume if you're at work .
Nice stuff Lincoln, thank you.